|
Message-Id: <201407260221.s6Q2Lhtb013026@linus.mitre.org> Date: Fri, 25 Jul 2014 22:21:43 -0400 (EDT) From: cve-assign@...re.org To: ppandit@...hat.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE request Linux Kernel: net: SCTP: NULL pointer dereference -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > Linux kernel built with the support for Stream Control Transmission Protocol > (CONFIG_IP_SCTP) is vulnerable to a NULL pointer dereference flaw. It could > occur when simultaneous new connections are initiated between a same pair of > hosts. > > A remote user/program could use this flaw to crash the system kernel resulting > in DoS. > > http://patchwork.ozlabs.org/patch/372475/ Use CVE-2014-5077 for this issue in the sctp_assoc_update function in net/sctp/associola.c (not yet patched at http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/tree/net/sctp/associola.c). - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJT0xAbAAoJEKllVAevmvmsiHcIAMNXsXM6x1ZWJg76+Cx/KDBu CP2O8uheLuZ6DysmnF0UjN8x9LVSN3QEnKlhohULeohoslSISkiQr7bJLtYodLjA lvugVwmOhSPKiz/5ro8RoTTNNljDY3xGOE4+W+m8ypbTK69Dudqu0gEWe5ipSLWF CzaYajr0uB76jv+i6qaGxfiEClcSkGRbV25uq3t8DFYlNyu9phVTrHk16MzQi3Us 3rST3OviZX2ZVVmx/IP0XuN7HVS6TXCuwA1mAlpXnADLvwQ7UVxr5O9Gvzor3d3M adGp6FZ7cJ28WJICemDct3Y2ELQNJE2H99wsXAhOQf2+VfeHRmEJ42GHNVFh7mI= =RQ8e -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.